ID SECURITYVULNS:VULN:7844
Type securityvulns
Reporter
Modified 2007-06-24T00:00:00
Description
PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
{"id": "SECURITYVULNS:VULN:7844", "bulletinFamily": "software", "title": "Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "published": "2007-06-24T00:00:00", "modified": "2007-06-24T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:7844", "reporter": " ", "references": ["https://vulners.com/securityvulns/securityvulns:doc:17336", "https://vulners.com/securityvulns/securityvulns:doc:17332", "https://vulners.com/securityvulns/securityvulns:doc:17334", "https://vulners.com/securityvulns/securityvulns:doc:17331", "https://vulners.com/securityvulns/securityvulns:doc:17333"], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:09:26", "edition": 1, "viewCount": 3, "enchantments": {"score": {"value": 4.5, "vector": "NONE", "modified": "2018-08-31T11:09:26", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2019-7844", "CVE-2017-7844", "CVE-2014-7844", "CVE-2018-7844", "CVE-2019-6762"]}, {"type": "talosblog", "idList": ["TALOSBLOG:EED1741F2FA90B90A8225826C1A168CC"]}, {"type": "talos", "idList": ["TALOS-2018-0739"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310815081"]}, {"type": "nessus", "idList": ["FOXIT_PHANTOM_9_5_0.NASL", "GENTOO_GLSA-201802-03.NASL", "MOZILLA_FIREFOX_57_0_1.NASL", "FOXIT_READER_9_5_0.NASL", "GENTOO_GLSA-201804-06.NASL", "FOXIT_PHANTOM_8_3_10.NASL", "FREEBSD_PKG_B7E230502D5D4E619B4862E89DB222CA.NASL", "MACOSX_FIREFOX_57_0_1.NASL"]}, {"type": "threatpost", "idList": ["THREATPOST:08F6912E81E275D1FD4114A3B8CC91F2"]}, {"type": "ciscothreats", "idList": ["CISCO-THREAT-58055"]}, {"type": "gentoo", "idList": ["GLSA-201802-03", "GLSA-201804-06"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:17336", "SECURITYVULNS:DOC:17334", "SECURITYVULNS:DOC:17331", "SECURITYVULNS:DOC:17332", "SECURITYVULNS:DOC:17333"]}], "modified": "2018-08-31T11:09:26", "rev": 2}, "vulnersScore": 4.5}, "affectedSoftware": [{"name": "eNdonesia", "operator": "eq", "version": "8.4"}, {"name": "Webmin", "operator": "eq", "version": "1.350"}]}
{"rst": [{"lastseen": "2021-02-28T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **103[.]242.180.248** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **43**.\n First seen: 2021-02-10T03:00:00, Last seen: 2021-02-28T03:00:00.\n IOC tags: **shellprobe, generic**.\nASN 38788: (First IP 103.242.180.0, Last IP 103.242.181.255).\nASN Name \"IDNICICLOUDASID\" and Organisation \"PT Indonesian Cloud\".\nASN hosts 218 domains.\nGEO IP information: City \"\", Country \"Indonesia\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-10T00:00:00", "id": "RST:CD396E7A-7844-31EF-B107-987D0BC50ABC", "href": "", "published": "2021-03-01T00:00:00", "title": "RST Threat feed. IOC: 103.242.180.248", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-28T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **http://178[.]175.100.251:55986/mozi.a** in [RST Threat Feed](https://rstcloud.net/profeed) with score **65**.\n First seen: 2021-02-27T03:00:00, Last seen: 2021-02-28T03:00:00.\n IOC tags: **malware**.\nIt was found that the IOC is used by: **mozi**.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-27T00:00:00", "id": "RST:E6D5D363-7844-3A48-B347-16F0AE14E041", "href": "", "published": "2021-03-01T00:00:00", "title": "RST Threat feed. IOC: http://178.175.100.251:55986/mozi.a", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-27T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **webprofile23568[.]me** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2019-12-15T03:00:00, Last seen: 2021-02-27T03:00:00.\n IOC tags: **spam**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2019-12-15T00:00:00", "id": "RST:0809AF27-7844-347B-AF1D-4AB78186E96C", "href": "", "published": "2021-02-28T00:00:00", "title": "RST Threat feed. IOC: webprofile23568.me", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-27T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **xn--80a5abape8e[.]xn--p1ai** in [RST Threat Feed](https://rstcloud.net/profeed) with score **20**.\n First seen: 2020-09-27T03:00:00, Last seen: 2021-02-27T03:00:00.\n IOC tags: **spam**.\nWhois:\n Created: 2020-09-27 04:45:10, \n Registrar: unknown, \n Registrant: Private Person.\nIOC could be a **False Positive** (Domain not resolved, but Whois records found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-09-27T00:00:00", "id": "RST:C4EAE438-7844-3675-BF5D-DC01C125557D", "href": "", "published": "2021-02-28T00:00:00", "title": "RST Threat feed. IOC: xn--80a5abape8e.xn--p1ai", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-26T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **1609543254[.]cds059.se2.hn** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2021-01-03T03:00:00, Last seen: 2021-02-26T03:00:00.\n IOC tags: **malware**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-01-03T00:00:00", "id": "RST:D617397B-7844-38BF-B7A8-F8DB2C889D5D", "href": "", "published": "2021-02-28T00:00:00", "title": "RST Threat feed. IOC: 1609543254.cds059.se2.hn", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-12T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **droidroots[.]com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2020-07-24T03:00:00, Last seen: 2021-02-12T03:00:00.\n IOC tags: **malware**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-07-24T00:00:00", "id": "RST:395F408D-7844-326D-91E5-410CCA9EA828", "href": "", "published": "2021-02-25T00:00:00", "title": "RST Threat feed. IOC: droidroots.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-01-17T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **bloc[.]smartcoinpool.com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2019-12-15T03:00:00, Last seen: 2021-01-17T03:00:00.\n IOC tags: **cryptomining**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2019-12-15T00:00:00", "id": "RST:2998F478-7844-3BB8-A608-53B7021EAE77", "href": "", "published": "2021-02-24T00:00:00", "title": "RST Threat feed. IOC: bloc.smartcoinpool.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-01-17T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **cpanel[.]by.dev.api.binance.com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2021-01-17T03:00:00, Last seen: 2021-01-17T03:00:00.\n IOC tags: **cryptomining**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-01-17T00:00:00", "id": "RST:AD0EC707-7844-3480-9399-3E6674AEF117", "href": "", "published": "2021-02-24T00:00:00", "title": "RST Threat feed. IOC: cpanel.by.dev.api.binance.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 grimenamprop.publicnode.ydns.eu** in [RST Threat Feed](https://rstcloud.net/profeed) with score **20**.\n First seen: 2021-02-23T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **cryptomining**.\nWhois:\n Created: 1970-01-01 00:00:00, \n Registrar: KeySystems GmbH, \n Registrant: unknown.\nIOC could be a **False Positive** (Domain not resolved, but Whois records found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-23T00:00:00", "id": "RST:88E4B65C-7844-3F8C-AC64-DF69D3DB8FE2", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 grimenamprop.publicnode.ydns.eu", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 store-paymentsinfo.coinpoolit.webhop.me** in [RST Threat Feed](https://rstcloud.net/profeed) with score **48**.\n First seen: 2021-02-23T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **cryptomining**.\nDomain has DNS A records: 52[.]1.161.122\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-23T00:00:00", "id": "RST:BF696A59-7844-3078-9D92-600C5921AF7E", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 store-paymentsinfo.coinpoolit.webhop.me", "type": "rst", "cvss": {}}]}